1、 NOTICE OF COPYRIGHT This is a copyright document and may not be copied or distributed in any form or manner without the permission of ISA. This copy of the document was made for the sole use of the person to whom ISA provided it and is subject to the restrictions stated in ISAs license to that pers
2、on. It may not be provided to any other person in print, electronic, or any other form. Violations of ISAs copyright will be prosecuted to the fullest extent of the law and may result in substantial civil and criminal penalties. TECHNICAL REPORT ISA-TR100.20.01-2017 Common Network Management: Concep
3、ts and Terminology Approved 10 March 2017 ISA-TR100.20.01-2017, Common Network Management: Concepts and Terminology ISBN: 978-1-945541-42-1 Copyright 2017 by the International Society of Automation (ISA). Not for resale. Printed in the United States of America. No part of this publication may be rep
4、roduced, stored in a retrieval system, or transmitted in any form or by any means (electronic mechanical, photocopying, recording, or otherwise), without the prior written permission of the Publisher. ISA 67 Alexander Drive P.O. Box 12277 Research Triangle Park, North Carolina 27709 - 3 - ISA-TR100.
5、20.01-2017 Copyright 2017 ISA. All rights reserved. Preface This preface, as well as all footnotes and annexes, is included for information purposes and is not part of ISA-TR100.20.01-2017. This document has been prepared as part of the service of ISA toward a goal of uniformity in the field of inst
6、rumentation. To be of real value, this document should not be static but should be subject to periodic review. Toward this end, the Society welcomes all comments and criticisms and asks that they be addressed to the Secretary, Standards and Practices Board; ISA; 67 Alexander Drive; P. O. Box 12277;
7、Research Triangle Park, NC 27709; Telephone (919) 549-8411; Fax (919) 549-8288; E-mail: standardsisa.org. The ISA Standards and Practices Department is aware of the growing need for attention to the metric system of units in general, and the International System of Units (SI) in particular, in the p
8、reparation of instrumentation standards. The Department is further aware of the benefits to USA users of ISA standards of incorporating suitable references to the SI (and the metric system) in their business and professional dealings with other countries. Toward this end, this Department will endeav
9、or to introduce SI-acceptable metric units in all new and revised standards, recommended practices, and technical reports to the greatest extent possible. Standard for Use of the International System of Units (SI): The Modern Metric System, published by the American Society for Testing certifies ind
10、ustry professionals; provides education and training; publishes books and technical articles; hosts conferences and exhibits; and provides networking and career development programs for its 40,000 members and 400,000 customers around the world. ISA owns A, a leading online publisher of automation-re
11、lated content, and is the founding sponsor of The Automation Federation (www.automationfederation.org), an association of non-profit organizations serving as “The Voice of Automation.“ Through a wholly owned subsidiary, ISA bridges the gap between standards and their implementation with the ISA Secu
12、rity Compliance Institute (www.isasecure.org) and the ISA Wireless Compliance Institute (www.isa100wci.org). This technical report is a deliverable from the Common Network Management (CNM) project. The following served as voting members on the ISA100 committee: NAME COMPANY P. Kinney, Co-Chair Kinne
13、y Consulting LLC H. Storey, Co-Chair Herman Storey Consulting D. Dunn, Managing Director Phillips 66 R. Assimiti NIVIS LLC A. Bastiaans ABastiaans ICT W. Boyes Spitzer and Boyes LLC S. Boyle Irving Refinery P. Brett Honeywell M. Carley Nova Chemicals Ltd. R. Caro CMC Associates A. Cervinka NewTrax T
14、echnologies M. Chilom Landis+Gyr E. Cosman OIT Concepts, LLC R. Enns Consultant R. Gooch R3 Sensors T. Hasegawa Yokogawa Electric Corp. B. Janak Chevron H. Kagan Invensys Operations Management E. Lambert Wunderlich-Malec Engineering A. Maamor Alam Impian G. Mulligan Consultant M. Neelen Shell Global
15、 Solutions Intl BV L. Periera FlexWorks Solutions International T. Phinney Consultant R. Sanders Exxonmobil Research such as providing authentication and credentials for each node and application device, and key management for secure communications over networks CNM policies network management rules
16、 established by policy administrator person (PAP), based on the sites 1 The CAM is a component of the automation system. An example of CAM is a domain controller. - 11 - ISA-TR100.20.01-2017 Copyright 2017 ISA. All rights reserved. business rules CNM adapter network role that enables connection and
17、communication of a non-CNM open interface protocol (OIP) device(s) with the CNM common practice a typical approach (e.g., service, command, attribute, parameter) that is widely applicable to one or more types of field devices defined with the purpose of enhancing interoperabilit y conduit logical gr
18、ouping of communication assets that protects the security of the channels it contains connection node node that provides network access to other nodes, examples of such functionality are routers, firewalls, etc. differentiated services (DiffServ) architecture that specifies a scalable mechanism for
19、classifying and managing network traffic and providing quality of service (QoS) dynamic host configuration protocol (DHCP) a network protocol that enables a server or network manager to automatically assign an IP address to a node from a defined range of numbers reserved for link local addresses edg
20、e device communication security asset, within a zone or conduit, that provides an interface between a zone and a conduit edge network a network located on the periphery of a centralized network enforcer in policy based management terminology, an entity that monitors, responds to, and prevents unwant
21、ed behaviors from happening on the network in real-time extensible system design that has taken future growth and anticipated future requirements into consideration firewall role controlling the incoming and outgoing network or subnetwork traffic based on an applied rule set flow control management
22、of device communication flow gateway network role of an interface to another network using one or more different communication protocols interface metadata access protocol (IF-MAP) open standard client/server protocol as one of the core protocols of the trusted network connect (TNC) open architectur
23、e interface latency delay (e.g., between transmission and reception of a message) link actual connection between two devices metadata data about data ISA-TR100.20.01-2017 - 12 - Copyright 2017 ISA. All rights reserved. network administrator individual or entity responsible for the maintenance of com
24、munication network hardware and software systems network infrastructure device device that interconnects different components of the network together in order to support the exchange of information network management agent element within a device with an external interface to communicate management
25、data network manager network infrastructure role that is responsible for functions such as configuration of the network, scheduling communication between network devices, management of the routing tables , and monitoring and reporting the health of the network personal area network (PAN) a network c
26、omposed of short range wired or wireless devices policy administrator person (PAP) person or people responsible for translating the business rules relative to network and security management into policies (security- and network management-wise) payload content of a communication transmission that re
27、presents the functional purpose of the transmission policy set of rules to administer, manage, and control access to network resources priority importance of an entity, flow, or message requesting network resources that are limited in nature protocol defined set of syntax, semantics, and synchroniza
28、tion for messages between or among communicating entities proxy agent (e.g., application) on a device (e.g., gateway) that acts as an intermediary for requests seeking resources from other devices such as field devices publish/subscribe communication message pattern in which the publisher sends a me
29、ssage to one or more receivers, called subscribers whose interest in receiving publication messages has been indicated quality of service (QoS) overall performance of a network as seen by the users of the network (often includes metrics such as latency, jitter, or availability) router network role j
30、oining network segments together at ISO layer 3 resource reservation protocol (RSVP) protocol for creation of a reservation of resources for a device or devices scalable able to shrink or grow (e.g., number of devices or the number of channels) security association secure communication relationship
31、established between or among communicating entities based on the use of a set of shared security attributes - 13 - ISA-TR100.20.01-2017 Copyright 2017 ISA. All rights reserved. service semantics and synchronization of a communication layer interface subnet a logical part of a network system manager
32、network manager with additional responsibilities such as application resource management time source source of networks clock synchronization messages time synchronization synchronization of the clocks of network devices time translation conversion of one time keeping definition to another (e.g., TI
33、A to UTC) topology the arrangement of a network that includes both the network nodes and how they intercommunicate. Physical topology describes the geometric layout of the nodes. Logical topology describes the path signals take between or among network nodes. unique local address private or internal
34、 IPv6 networks that are assigned by routers implementing DHCP white list software that is allowed and/or preferred in a network Wi-Fi alliance that sets configurations and performance on the IEEE 802.11 based devices wireless local area network (WLAN) network consisting of wireless devices within a
35、physical area considered to be local wireless mesh network wireless network logical communication topology in which network nodes cooperate to propagate a message along a route from source to destination wireless network manager role of network node to manage the communication portion of the network
36、 nodes in such a manner as to serve the intended application extensible markup language (xml) markup language defining a set with rules and procedures for encoding documents into a format that is both human-readable and machine-readable zone grouping of logical or physical assets that share common s
37、ecurity requirements zone edge device device situated at the edge of a zone acting as a portal into and out of the zone 3.2 Abbreviations/Acronyms AAA Authentication, Authorization, and Accounting AODV Ad hoc On-Demand Distance Vector BBR Back Bone Router CAM Common Applications Manager CIA Confiden
38、tiality, Integrity and Availability CNM Common Network Manager ISA-TR100.20.01-2017 - 14 - Copyright 2017 ISA. All rights reserved. CSM Common Security Manager DHCP Dynamic Host Configuration Protocol DiffServ Differentiated Services DLL Data Link Layer DNS Domain Name Service EAM Enterprise Asset M
39、anagement ERP Enterprise Resource Planning FIFO First in, First out GTS Guaranteed Time Slot HART Highway Addressable Remote Transducer IANA Internet Assigned Number Authority IEC International Electrotechnical Commission IEEE Institute of Electrical and Electronics Engineers IETF Internet Engineeri
40、ng Task Force IIoT Industrial Internet of Things IoT Internet of Things IP Internet Protocol IT/OT Information Technology/Operations Technology ITU International Telecommunications Union LAN Local area network LLC Logical Link Control MAC Media Access Control MAN Metropolitan area network OIP Open I
41、nterface Protocol OSI Open Systems Interconnect OUI Organizationally Unique Identifier PAN Personal Area Network PAP Policy Administrator Person PDP Policy Decision Point PEP Policy Enforcement Point PHY Physical Layer QoS Quality of Service RAC Registration Authority Committee (IEEE) REST Represent
42、ational State Transfer RF Radio Frequency SNMP Simple Network Management Protocol SOAP Simple Object Access Protocol TCG Trusted Computing Group TCP Transmission Control Protocol - 15 - ISA-TR100.20.01-2017 Copyright 2017 ISA. All rights reserved. TLS Transport Layer Security TSCH Time Scheduled Cha
43、nnel Hopping TSN Time Sensitive Networks UDP User Datagram Protocol ULA Unique local address VPN Virtual Private Network WAN Wide Area Network WNM Wireless Network Manager (or, depending upon context, Management) XMPP eXtensible Messaging and Presence Protocol ISA-TR100.20.01-2017 - 16 - Copyright 2
44、017 ISA. All rights reserved. 4 Industrial networks 4.1 Overview Industrial wireless communication systems often consist of a wide variety and number of diverse wireless networks making management a challenge. The industrial automation industry could benefit from a CNM that extends over other networ
45、k managers in the facility. 4.2 Current situation Today many industrial facilities have a multitude of wireless networks, both proprietary and standards based, working autonomously to fulfill specific automation needs. It is expected that the numbers of unique wireless networks and the numbers of ne
46、twork devices will continue to grow; however, since the spectrum is not growing, these networks will increasingly compete for a common frequency band. Each of these networks typically has unique network management devices, protocols, and metrics. As the number of networks and the size of those netwo
47、rks grow, the complexities of managing all of these networks may overstrain existing network management staffing and could often tend to favor one network over another for given shared resources. Additionally, the guidance from many wireless network vendors does not take into account the characteris
48、tics of the other wireless networks in use. The method to resolve conflicts would typically be to turn off the other wireless network or move it out of range rather than a deeper understanding of how to modify the characteristics of all wireless networks to coexist in a coordinated manner. An automa
49、ted coexistence management concept to use the spectrum efficiently is specified in IEC 62657-1. Further information on these types of issues may be found in IEC 62657-2 . Finally, unique security requirements for many wireless networks require the operators to understand all security procedures of each network. Mobile devices often are not allowed to participate in multiple networks due to lack of shared network concepts of authority, authenticity, etc. 4.3 Challenges 4.3.1 General challenges to industry In todays manufacturing and processing operations, opera
copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1